Transparent network tap
☆122Oct 7, 2015Updated 10 years ago
Alternatives and similar repositories for ntap
Users that are interested in ntap are comparing it to the libraries listed below
Sorting:
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- VirusTotal tools☆91Nov 12, 2020Updated 5 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- OpenDNS Graph Miner☆45Apr 28, 2017Updated 8 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- (Abandoned) Extract packages from an Android device☆53Apr 9, 2021Updated 4 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆39Sep 2, 2020Updated 5 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.…☆29Jul 31, 2021Updated 4 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Nov 11, 2013Updated 12 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Feb 5, 2017Updated 9 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- ☆12Nov 24, 2016Updated 9 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Scripts to analyze stuff☆147Jul 22, 2025Updated 7 months ago
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- ☆12Sep 4, 2013Updated 12 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Sep 9, 2015Updated 10 years ago